3.
Neev Cloud Services
Cloud
Infrastructure
Management
Cloud Deployments
& Monitoring
Cloud Application
Design &
Development
Architecting & Developing
for the Cloud
Using AWS since the year it was launched
Now an Official AWS Solution Provider

9.
• Internet-scale, world-class infrastructure that benefits from the same engineering
expertise that has built Amazon into the world’s largest online retailer. Proprietary
DDoS mitigation techniques are used.
• Standard DDoS mitigation techniques such as sync cookies and connection limiting
are also used. To further mitigate the effect of potential DDoS attacks, Amazon
maintains internal bandwidth which exceeds its provider-supplied Internet
bandwidth.
• Protection against Man In the Middle (MITM) Attacks, IP Spoofing, Port Scanning
and Packet Sniffing.
• Amazon EC2 provides a complete firewall solution; this mandatory inbound firewall
is configured in a default deny-all mode and Amazon EC2 customers must explicitly
open the ports needed to allow inbound traffic.
• Options for secure data upload/download and encryption of data at rest (on S3).
Security on AWS

12.
• HA Architecture.
• REST services and use of AWS APIs for managing workflows, handling cloud-based queues.
• Example Scenario: Running zero servers during zero work-load demand and automatically
launching servers based on the tasks in the queue.
• Control panels for environment control.
• Example Scenario: Shutdown a demo or staging environment during periods of non-use
and quickly bring up the entire environment within minutes at the press of a button.
• Traffic & Time based Auto-scaling.
• Example Scenario: Scale-down instances during known periods of low-traffic such as night
time or weekends.
• Services for automated deployments.
• Use of S3 and CloudFront (CDN) for content delivery.
• Eucalyptus & OpenStack for Private Clouds.
Engineering Cloud Apps